Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Book of Wireless: A Painless Guide to Wi-Fi and Broadband Wireless
The Book of Wireless: A Painless Guide to Wi-Fi and Broadband Wireless
Broadband wireless networks bring us closer to the Internet's ultimate destiny of interconnecting everyone, everywhere. But wireless networking can be a bit geeky and nerve-wracking without a proper guide. Let's face it: Networking can be hard.

If you're one of the last holdouts still connected to the Internet by a wire, The Book of...

Essential Skills for Agile Development
Essential Skills for Agile Development
Agile Development, in particular, eXtreme Programming (XP), has been gaining a lot of momentum because it can effectively address the problems plaguing software development such as mis-understanding customers' requirements, missing deadlines, over-budget, conflicts between customers and developers and poor maintainability of legacy systems....
Red Hat Linux 9 Professional Secrets
Red Hat Linux 9 Professional Secrets
This ultimate under-the-hood guide to Red Hat Linux 9 takes the reader beyond obvious information about this complicated OS, revealing hidden features, tricks and alternate methods not easily found elsewhere.

It takes an expert to unlock the deepest secrets of Red Hat Linux 9–to show you what’s really under the hood and how
...
Janitors, Street Vendors, and Activists: The Lives of Mexican Immigrants in Silicon Valley
Janitors, Street Vendors, and Activists: The Lives of Mexican Immigrants in Silicon Valley
"In a time when we have great need to understand Mexican immigrants and their place in U.S. society, Zlolniski offers a superior analysis of why and how advanced capitalist economies employ undocumented workers. After reading his book, we will never think again of immigration as something that exclusively comes from outside. The immigrants,...
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identity--a platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find...
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)

Europay, MasterCard, and Visa developed a standard for chip cards, referred to as the EMV, allowing consumers and businesses greater protection against fraud compared with magnetic stripe cards. Implementing Electronic Card Payment Systems provides a comprehensive overview of the EMV chip solution and explains how this technology...

Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)

Most anywhere in the developed world, I can use a small rectangular piece of plastic, issued to me by a bank I have never visited, to obtain local currency or purchase goods and services directly from a merchant. The cashier and I may not even speak a common language, and the face of my card may look quite different from those carried...

Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

Deep Belief Nets in C++ and CUDA C: Volume 2: Autoencoding in the Complex Domain
Deep Belief Nets in C++ and CUDA C: Volume 2: Autoencoding in the Complex Domain
Discover the essential building blocks of a common and powerful form of deep belief net: the autoencoder. You’ll take this topic beyond current usage by extending it to the complex domain for signal and image processing applications. Deep Belief Nets in C++ and CUDA C: Volume 2 also covers several...
iPhoto '09: The Missing Manual
iPhoto '09: The Missing Manual

With iPhoto '09, Apple's popular photo organizer and editing program is better than ever. Unfortunately, intuitive as it may be, iPhoto still has the power to confuse anyone who uses it. That's why more people rely on our Missing Manual than any other iPhoto resource. Author and New York Times tech columnist David...

Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali: Practical Penetration Testing Techniques

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live...

PC User's Bible
PC User's Bible
The perfect go-to reference to keep with your PC

If you want to get the most out of your PC, you've come to the right source. This one-stop reference-tutorial is what you need to succeed with your Windows Vista or Windows® XP computer, whether it's a desktop or a laptop. From setting up your PC to using it...

Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy